Understanding Large Internet Service Provider Backbone Networks
|
|
|
- Ashlee Franklin
- 10 years ago
- Views:
Transcription
1 Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey
2 Purpose of the lecture You have theoretical background TCP/IP, routing protocols, layer 2, layer 3 You ve heard of the big ISP s WorldCom, Sprint, AT&T, AOL How do these ISP networks work? How is a large network structured? What routing protocols do you use? How does it all fit together? What are some of the challenges in operating the network?
3 Outline Network Architecture From a cloud to individual routers Router hierarchy Routing protocols Operational challenges A variety of practical issues Focus on network configuration The actual process of configuration Configuration management and Netdb
4 Review: Internet Architecture Divided into Autonomous Systems Distinct regions of administrative control (~11,500) Set of routers and links managed by a single institution Service provider, company, university, Hierarchy of Autonomous Systems Large, tier-1 provider with a nationwide backbone Medium-sized regional provider with smaller backbone Small network run by a single company or university Interaction between Autonomous Systems Internal topology is not shared between ASes but, neighboring ASes interact to coordinate routing
5 Review: Connections Between Providers dial-in access interdomain protocols ISP 2 intradomain protocols ISP 1 NAP destination ISP 3 commercial customer destination
6
7 Inside the Cloud Multiple POPs (Points of Presence) Like central offices in telephone network Space in POP may be owned or rented Within a POP: Multiple routers Routers may have different responsibilities: Access router Backbone router Internet Gateway Router Routers w/different responsibilities may be same model
8 Internet Gateway Router Connections to neighboring Tier 1 providers Few interfaces (interface = slot, as in a PC, for plugging in cards and cables) Fast interfaces Homogeneous interface technologies Mostly OC-x on Packet over SONET Limited filtering (filter = router feature to prevent unwanted traffic, by source or by destination)
9 Backbone Router No connections outside the network Moderate number of interfaces Fastest interfaces Interface technologies depend on physical transport network Mostly OC-x on Packet over SONET Very limited filtering Main purpose: move traffic through the network as fast and efficiently as possible Big, fast and stupid
10 Access Router Many connections, to customers, modem banks Connections only to backbone routers, not to each other Large number of interfaces Variety of interface speeds (depends on customer) Heterogeneous interface technologies (T1, T3, frame-relay ) Extensive filtering Packet marking (CoS/QoS)
11 The Router Hierarchy in a POP neighboring providers IGR few BR AR many modem banks,business customers,web/ servers
12 Motivation: Routing Protocols Customer C Customer A Router X ISP 2 Router Y ISP 1 Our Customer A wants to reach Customer C. How can we guarantee this? Customer B
13 What we need to do Customer A sends us traffic destined for Customer C, which arrives at router X Router Y needs to know how to reach C Router X needs to know to go to Router Y to reach C Router X needs to know how to reach Router Y
14 Review: Routing Protocols BGP (Border Gateway Protocol) Path-vector Keep track of who knows how to reach prefixes Send prefixes we know how to reach to others OSPF (Open Shortest Path First) Link-state Each router computes best paths to all destinations, based on link information it receives Moy (1990)
15 Border Gateway Protocol (BGP) ASes announce info about prefixes they can reach Local policies for path selection (which to use?) Local policies for route propagation (who to tell?) Policies configured by the AS s network operator I can reach /23 I can reach /23 via AS
16 OSPF Routers flood information to learn the topology Routers determine next hop to reach other routers Path selection based on link weights (shortest path) Link weights configured by the network operator Path cost = 8
17 Routing Design first guess Use E-BGP as external routing protocol Send and receive advertisements about specific prefixes This will tell us Router Y how to reach C Use OSPF as internal routing protocol All destinations inside the network are known and controlled by us, so full table can be built based on a common strategy Provides lowest-cost path through the network This tells Router X how to reach Router Y Inject all E-BGP routes into OSPF Would then know how to reach C Would this work for large ISP?
18 Modify Routing Design OSPF would be flooding a huge amount of E- BGP information but would work on enterprise network, with small BGP table Use I-BGP to distribute E-BGP routes: E-BGP information obtained from other networks I-BGP relationship pairs (sessions) set up between routers inside network OSPF continues to provide lowest-cost paths through the network
19 Getting to Customer C Router X receives packets with destination customer C ebgp information tells Router Y the external path for customer C ibgp information tells router X that router Y is an exit point from our network to C OSPF tells Router X which outgoing link is on the shortest path through the network to router Y Forwarding table combines BGP and OSPF to map destination directly to outgoing link on Router X
20 I-BGP scaling Scaling problems with full-mesh IBGP Must have sessions between each pair of routers Configuration overhead; touch every router when adding a new router Session overhead: N TCP connections per router with associated state Memory overhead: storing routes learned from N sessions Solution: Route Reflector hierarchy Route reflector: learns best routes from edge routers Route reflector client: have I-BGP peering with one or two route reflectors
21 Peering options Peering Tier I providers mutually exchange information about their sets of customers Reduces cost and improves performance Normally a contractual business relationship Public peering Network Access Points (e.g., MAE East and MAE West) Public location for connecting routers from different ISPs Routers exchange both data and routing information Private peering Private connections between two peers Private peers exchange traffic between their customers
22 Peer-Peer Relationship Peers exchange traffic between their customers Free of charge (assumption of even traffic load) AS exports a peer s routes only to its customers Traffic to/from the peer and its customers advertisements peer traffic peer d
23 Also: how do we get customer routes? Customer pays us for service; forwarding traffic to them, sending their traffic out How do we know what their routes are? One option: static route Customer s IP addresses are kept in static route on provider s access router All traffic coming through provider s network uses static route to reach customer Static routes are redistributed into BGP Customer always sends traffic to Provider AR Is this good enough?
24 Multi-Homed Customer Speaking BGP Provider A Provider B Provider Customer Customer Motivations for using BGP Load balancing and fault tolerance Send updates to influence how traffic enters Apply routing policy to select outbound paths
25 Customers speaking BGP Some customers have their own ASN Customer multi-homed to multiple providers Customer with an ASN for historical reasons Some customers cannot get their own ASN Limited # of ASNs available (16-bit number) No new ASNs for single-homed customers Speaking BGP when customer has no ASN Private ASNs in the range of 64,512 to 65,535 Dedicated ASN owned by provider
26 Some operational challenges Now you have a rough idea of the structure Operational challenges what is it really like to operate a large ISP? Some topics to touch on briefly Management issues Provisioning issues Capacity planning issues Performance issues Configuration issues (we ll focus here in a moment)
27 Practical Operational Challenges Increase in the scale of the network Link speeds, # of routers/links, # of peering points Large network has 100s of routers and 1000s of links (already discussed managing routing protocols) Significant traffic fluctuations Time-of-day changes and addition of new customers/peers Special events (Olympics) and new applications (Napster) Difficult to forecast traffic load before designing topology Market demand for stringent network performance Service level agreements (SLAs), high-quality voiceover-ip
28 Additional Practical Operational Challenges Increase in network capability & feature complexity New services (Quality of Service, Virtual Private Networks) New routing protocols (MPLS, multicast)
29 Practical Capacity Planning Issues Deciding whether to buy/install new equipment What? Where? When? Examples Where to put the next backbone router When to upgrade a peering link to higher capacity Whether to add/remove a particular private peer Whether the network can accommodate a new customer Whether to install a caching proxy for cable modems Requirements Projections of future traffic patterns from measurements Cost estimates for buying/deploying the new equipment Model of the potential impact of the change (e.g., latency reduction and bandwidth savings from a caching
30 Uncertainty Focus on router configuration Decentralized manual router configuration (telnet) - Databases of record must be kept accurate Complexity Network policy not widely available/understood Very deep subject matter (e.g., interfaces) Limited commercial tools for CM/debugging Tools do not cover local conventions and policies Tools typically lag behind product releases
31 Cisco Router Configuration Language (IOS) Not user-friendly Certifications offered (CCNE etc.) Requires knowledge of low-level details ( assembly language ) Many options for arguments Not a formal language Simple grammar (keywords mixed with optional args) Generally unstructured - very specific parsing required Presents a moving target Multiple versions in marketplace (and in single network) Command-set extended very often Substantial expertise required 900+ unique statements in single network Long files (AR 1000 s of lines; BR and IGR 100 s)
32 Example: Cisco Router Configuration File Language with hundreds of different commands Cisco IOS is a de facto standard config language Sections for interfaces, routing protocols, filters, etc. version 12.0 hostname MyRouter! interface Loopback0 ip address ! interface Serial9/1/0/4:0 description MyT1Customer bandwidth 1536 ip address ip access-group 10 in! interface POS6/0 description MyBackboneLink ip address ip ospf cost 1024! router ospf 2 network area 9 network area 9! access-list 10 permit access-list 10 permit ip route Serial9/1/0/4:0
33 Netdb: Router configuration files to Network abstraction interface ATM9/0/0 description ip access-group rate-limit input ip route-cache no ip routeip route-cache bandwidth load-interval 3... Router configuration files Network abstraction Using Netdb, an accurate network view can be stored in a database, permitting querying, error checking, and specialized reporting
34 Netdb Architecture router config files Low level standard form Netdb Abstract network Database queries Network Management Tools (Tools on top) Database of record Traffic Analysis Security audits Discords Operations
35 Netdb and the CBB network Queries developed for specific topics Which router cards? Which router models? Are security features configured properly? Are BGP relationships configured properly? Results available daily Operations groups note discords, may fix them Capacity Planning may use topology queries Many research efforts enhanced Traffic engineering, traffic analysis Developing expertise base in configuration management
36 Tracking the State of the Network Network management groups Tier 1: Customer care Tier 2: Individual network elements Tier 3: Network-wide view Databases Customers (name, billing info, IP addresses, service,...) Network assets (routers, links, configuration, ) Data from the operational network Router configuration files (commands applied to router) Fault data (link/router failures, BGP session failures, ) Routing tables (dumps of BGP and forwarding tables)
37 Conclusions Large IP network is very complex; requires both expertise and personpower to manage carefully Router configuration is a very big subject (High schools now teaching Cisco configuration) Management issues often as difficult as technical issues Small changes in network configuration can have serious consequences; work must be done very expertly Performance management is a recent subject and just developing Large IP networks are very complicated! New technologies coming all the time (MPLS Tim Griffin on Thursday)
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.
Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
ETHEL THE AARDVARK GOES BGP ROUTING
Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,
Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.
Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Internet Routing Protocols Lecture 04 BGP Continued
Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Masterkurs Rechnernetze IN2097
Masterkurs Rechnernetze IN2097 Advanced computer networking Internet Protocols Prof. Dr.-Ing. Georg Carle, Wolfgang Mühlbauer Chair for Network Architectures and Services Computer Science Department Technical
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1
IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0
Border Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
BGP: Border Gateway Protocol
LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You
Routing and traffic measurements in ISP networks
Routing and traffic measurements in ISP networks Steve Uhlig Network Architectures and Services Delft University of Technology Email : [email protected] URL : http://www.nas.ewi.tudelft.nl/people/steve/
Fireware How To Dynamic Routing
Fireware How To Dynamic Routing How do I configure my Firebox to use BGP? Introduction A routing protocol is the language a router speaks with other routers to share information about the status of network
Textbook Required: Cisco Networking Academy Program CCNP: Building Scalable Internetworks v5.0 Lab Manual.
Course: NET 251 Building Scalable Internetworks Credits: 3 Textbook Required: Cisco Networking Academy Program CCNP: Building Scalable Internetworks v5.0 Lab Manual. Course Description: In this course,
Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] ABSTRACT
Understanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
Interdomain Routing. Outline
Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.
MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.
Lecture 18: Border Gateway Protocol"
Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed
Administra0via. STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16
BGP Brad Smith Administra0via How are the labs going? This week STP quiz Thursday, 5/9 Next week STP lab due Wednesday (in BE 301a!), 5/15 BGP quiz Thursday (remember required reading), 5/16 Following
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
Border Gateway Protocol Best Practices
Border Gateway Protocol Best Practices By Clifton Funakura The Internet has grown into a worldwide network supporting a wide range of business applications. Many companies depend on the Internet for day-to-day
How to Configure BGP Tech Note
How to Configure BGP Tech Note This document gives step by step instructions for configuring and testing full-mesh multi-homed ebgp using Palo Alto Networks devices in both an Active/Passive and Active/Active
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
BGP as an IGP for Carrier/Enterprise Networks
BGP as an IGP for Carrier/Enterprise Networks Presented by: Kevin Myers, SENIOR NETWORK ENGINEER IP ArchiTECHS MANAGED SERVICES Background Kevin Myers 15 + years in IT/Network Engineering Designed and
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.
ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network
Simple Multihoming. ISP/IXP Workshops
Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
BGP Terminology, Concepts, and Operation. Chapter 6 2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
BGP Terminology, Concepts, and Operation 1 IGP versus EGP Interior gateway protocol (IGP) A routing protocol operating within an Autonomous System (AS). RIP, OSPF, and EIGRP are IGPs. Exterior gateway
Lesson 5-3: Border Gateway Protocol
Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
Routing Protocol - BGP
Routing Protocol - BGP BGP Enterprise Network BGP ISP AS 3000 AS 2000 BGP is using between Autonomous Systems BGP(cont.) RFC 1771(BGPv4) Support CIDR Transfer the AS information to reach destination Using
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
6.263 Data Communication Networks
6.6 Data Communication Networks Lecture : Internet Routing (some slides are taken from I. Stoica and N. Mckewon & T. Griffin) Dina Katabi [email protected] www.nms.csail.mit.edu/~dina Books Text Book Data Communication
Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing
Routing Protocols scale: with 200 million destinations: can t store all dest s in routing tables! routing table exchange would swamp links! Hierarchical Routing Our routing study thus far - idealization
GregSowell.com. Mikrotik Routing
Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor
642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures
BGP. 1. Internet Routing
BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is
CHAPTER 3 STATIC ROUTING
CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Configuring a Basic MPLS VPN
Configuring a Basic MPLS VPN Help us help you. Please rate this document. Contents Introduction Conventions Hardware and Software Versions Network Diagram Configuration Procedures Enabling Configuring
Link-State Routing Protocols
Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
Chapter 49 Border Gateway Protocol version 4 (BGP-4)
Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)
Doing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
IP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
IP Routing Configuring RIP, OSPF, BGP, and PBR
13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Load balancing and traffic control in BGP
DD2491 p2 2011 Load balancing and traffic control in BGP Olof Hagsand KTH CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better Can
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
E6998-02: Internet Routing
E6998-02: Internet Routing Lecture 13 Border Gateway Protocol, Part II John Ioannidis AT&T Labs Research [email protected] Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures
